1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
bulgar [2K]
3 years ago
11

What process does a system use to officially permit access to a file or a program CIS 502 ?

Computers and Technology
1 answer:
ipn [44]3 years ago
4 0

Answer:

Authorization                                

Explanation:

Authorization is a security process to determine access levels related to system resources such as files, services, computer programs, data and application features. This is the method of allowing or denying access to a resource which enables the user to get access to various services and resources depending on the user's identity.

Authorization is the process that checks if a user has the permission to get access to a particular file or perform a particular action, ensuring that user has successfully authenticated himself. It refers to defining access policy.

For example a system administrator determines for the system device, in multi-user computer systems, which users are granted access to system and its resources and privileges are granted.

You might be interested in
Why is it important to verify a customer complaint?
diamong [38]
B.Proper diagnosis will save time and money
8 0
3 years ago
Will mark Brainliest!! What is the best hard disk compacity? Why?
choli [55]

Answer:

The SeaGate FireCuda is the best hybrid hard drive.

Explanation:

The SeaGate FireCuda is the best hybrid hard drive on the market. It can fit up to 2TB of data, and then its 8GB of solid state cache storage learns which data you use most, so that you can access it quickly. That speed boost is even sweeter when you consider that this drive spins at 7,200rpm.

3 0
2 years ago
For homework, we have to figure out what's in the picture. It's " too close to tell " but I can't figure out what it is. Any ide
CaHeK987 [17]
It seems like some type of fabric, maybe a car seat? i honestly don't know, sorry
4 0
3 years ago
How do I mirror cast my smart lg tv?​
lora16 [44]
I really wish I could help you but I don’t know
6 0
3 years ago
Create a stored procedure sp_Q1 that takes two country names like 'Japan' or 'USA'as two inputs and returns two independent sets
Zigmanuir [339]

Answer:

Check the explanation

Explanation:

CREATE PROCEDURE sp_Q1

<u><em>"at"</em></u>country1 NVARCHAR(15),

<u><em>"at"</em></u>country2 NVARCHAR(15)

AS

BEGIN

  BEGIN

      SELECT SupplierID, CompanyName, Phone, Country FROM suppliers

      where Country in (<u><em>"at"</em></u>country1,<u><em>"at"</em></u>country2)

     

  SELECT ProductID, ProductName, UnitPrice, SupplierID FROM Products

      where SupplierID in(

      SELECT SupplierID FROM suppliers

      where Country in (<u><em>"at"</em></u>country1,<u><em>"at"</em></u>country2)) ORDER BY SupplierID

  END

END

GO

-- Testing script.

DECLARE <u><em>"at"</em></u>RC int

DECLARE <u><em>"at"</em></u>country1 nvarchar(15)

DECLARE <u><em>"at"</em></u>country2 nvarchar(15)

-- Set parameter values here.

set <u><em>"at"</em></u>country1='UK'

set <u><em>"at"</em></u>country2='Canada'

EXECUTE <u><em>"at"</em></u>RC = [dbo].[sp_Q1]

<u><em>"at"</em></u>country1

,<u><em>"at"</em></u>country2

GO

Kindly check the attached images below to see how it looks like on a code editor.

7 0
3 years ago
Other questions:
  • The computers connected to the main server are called ______.
    14·2 answers
  • What can a person do to help increase their credit score? AUse only a small percentage of your credit limit. BResearch student l
    8·1 answer
  • A patient presents at an outpatient urgent care facility with an acute illness and is seen by a provider. A detailed history wit
    13·1 answer
  • Select the correct answer.
    15·1 answer
  • Write a function called intersect with four float parameter
    11·1 answer
  • What are the defenses to protect against these attacks?
    13·1 answer
  • Your network has four Hyper-V hosts, which are running three domain controllers and about 10 member servers. Three of the member
    10·1 answer
  • Who is the father of computer?​
    14·1 answer
  • Pls say correct guyz pls pls pls
    7·1 answer
  • Edit the program provided so that it receives a series of numbers from the user and allows the user to press the enter key to in
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!